Local Area Network Management

Size: px
Start display at page:

Download "Local Area Network Management"

Transcription

1 Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area Networks (LANs). All LANs require regular adinistration and anageent in order to function efficiently and effectively. A Network Adinistrator is required to perfor a range of duties in order to achieve this efficiency and effectiveness. These include aintaining syste security, ipleenting backup strategies, installing software, upgrading software, anaging data storage and ensuring provision of virus protection. Training Adinistrators In soe cases, schools ay choose to retrain existing staff to take on the role of Network Adinistrator. Other schools ay choose to outsource this service. Schools ay also wish to develop their own support networks within local groups and via e-ail through the Internet to share ideas and experiences regarding coputer network adinistration. Your District Technology Adviser can also offer advice in this area. If the school intends to take on the network adinistration tasks itself, an appropriate training course for the school Network Adinistrator is desirable. Specific Network Adinistrator training courses are available for various network platfors (Novell Netware, Windows NT Advanced Server, Apple Macintosh Workgroup Server etc). These are norally provided by coercial training centres, and in soe cases, accreditation is available. Soe TAFE colleges also offer siilar training courses however these are norally spread out over a longer period of tie. The school ay wish to consider using funding for the Coputer Coordinator resource as a way to support anageent of the coputer network in this way. The use of a second or third person to shadow the ain network adinistrator or the sharing of adinistration tasks aong two or three staff will reduce the dependency on one person in the school. Situations where only one adinistrator is anaging the whole network should be avoided. In the case where this person leaves the school or is not available for a period of tie, it would ean the entire network adinistration knowledge in the school would also be unavailable. Inforation Technology Bureau MLANS304.doc 1 Educational Technologies Unit

2 Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent The alternative is outsourcing soe or all adinistration tasks to an external service provider. Many coercial network adinistration providers offer a dial-up adinistration service whereby the provider accesses the syste via a phone link to perfor any adinistrative tasks at a uch cheaper rate than incurred through site visits. This ay be particularly useful for schools in country areas where access to technology professionals ay be costly due to distances involved. Soe tasks such as software installation would ost likely have to occur on-site. Regardless of whether the school chooses to perfor its own adinistration or have it outsourced, it is highly recoended that coprehensive details of the school s coputer network such as layout, configurations and software licences be produced and updated as necessary. Methods for autoating coon adinistration functions such as printer queue aintenance, backup processes and user setup should also be developed and docuented for future referral. Master passwords for all parts of the syste should be written in a book and stored in the school safe. It is also helpful to produce a list of work practices or rules for the use of coputers and affix the near each workstation. This will help reinforce the school s policy with regard to the use of coputers and the local area network. Regular Maintenance Tasks Aside fro syste backup and software installation which are discussed in separate sections, soe of the regular aintenance tasks include: workstation network client set-up; network interface card testing/installation/replaceent; cable testing; cable patching; purging of deleted files; new user setup; user password aintenance; user support; printer / peripheral configuration and aintenance; general troubleshooting. These tasks are vital to the continued operation of the school s coputer network. Inforation Technology Bureau MLANS304.doc 2 Educational Technologies Unit

3 Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Backup, Recovery and Contingency Planning When it reaches the stage that the school is utilising either a centralised or distributed application and data syste, it is vital that syste downtie be avoided or at least iniised. If any of the following coponents of the network fail, all (or at least soe) of the syste will be unavailable for use: 1 AC Power (blackout / surge / spike / brownout); 2 File server(s); hard disk / hard disk controller; power supply; otherboard; network interface card. 3 Hubs (particularly those connected to the servers); 4 Cable backbone. The school s contingency (or disaster recovery) plan should provide solutions to be able to recover (quickly) fro any of the coponent failures entioned above. As exaples, the following solutions are available: Uninterruptible Power Supply (UPS) for server(s) and hubs; tape backup syste to regularly backup server hard disks; hard disk irroring; server irroring; duplication of cable backbone; avoiding single points of failure. As an absolute iniu, a UPS for the server(s) with server shutdown capability and a reliable tape backup strategy ust be incorporated in the contingency plan. File server: one of the achines in a local network that serves as a data storage centre i.e. a place where all the shared data files used throughout the network are stored. otherboard: this is where the electronic circuits are located for processing and storing data. hub: hardware or software device that contains ultiple independent but connected odules of network and Internetwork equipent. Hubs can be active (where they repeat signals through the) or passive (where they do not repeat, but erely split, signals through the). cable backbone: this type of cabling links together the various segents of a LAN e.g. potentially linking ultiple buildings or floors. uninterruptible power supply: a UPS is a basic unit for ensuring an even flow of power to a fileserver. Brown/black outs, power surges / spikes and power cuts can all be accoodated e.g. when a power cut occurs, the UPS can broadcast a prerecorded essage over the network warning users to save their work and then turn off (down) the file server correctly. irroring: this is the process of aking a duplicate backup copy. Inforation Technology Bureau MLANS304.doc 3 Educational Technologies Unit

4 Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Security There are two fors of security: 1 Physical security (to avoid theft, fire, water and wilful physical daage); 2 Data security (to avoid loss / corruption of data and applications and to aintain privacy). 1 Physical Security It is iportant to store vital network coponents such as servers, hubs and routers in secure locations such as a strongroo. Most of this equipent needs little or no adinistration and should be safely stored to avoid theft or daage fro fire. Coponents such as cabling should be concealed in conduit wherever possible and should not be easily visible when run outside buildings. Siilarly, coponents such as ain power switchboards should always be kept locked. 2 Data Security If data security has not been investigated thoroughly before configuring the syste, difficulties and frustrations ay arise. A syste could be developed so it is easy to break into through a very lax security fraework, allowing students to access parts of the syste and cause data daage. On the other hand, it could be too difficult to navigate because of the overuse of passwords and tight restrictions. Effective data security involves the allocation of trustee rights to users or groups of users for specific parts of each server and the allocation of passwords where appropriate. Networkaware enu systes that restrict access to sensitive areas of the syste (such as MS-DOS), providing Read-Only access to application areas on the servers and the protection and regular changing of sensitive passwords can ensure effective and secure use of your network syste. As a general rule, only allocate each user the iniu rights necessary. Data Storage and Manageent The issue of data storage can be coplex. In a networked situation, it is usually best to store all iportant data files on a fileserver rather than on floppy diskettes or on local hard disks in workstations or standalones. The reason for this is that the school s contingency plan should include total and regular backup of all fileservers while there ay not be any direction to Inforation Technology Bureau MLANS304.doc 4 Educational Technologies Unit

5 Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent backup local workstations. Losing docuents or other data files through corruption or accidental deletion when there are no backups will require the anual recreation of those files. This is both tie-consuing and avoidable. If it is decided that all iportant data storage is to be on the fileserver(s), then it is iportant to ensure adequate disk space is available to allow this to occur. A tape backup solution ust also be provided which is capable of duplicating this aount of data storage. Tape backups should be stored in a secure area, preferably away fro the fileserver. Backup tapes could be destroyed or stolen if stored together with the server. When setting up data storage areas on a file server, it should be noted that staff ay require separate areas of the disk where they have private use and shared use. A user s private folder should not be visible to other users while the shared folder should be visible to all users. Separate shared folders can be created for staff and students. If it is decided that no data is to be stored on the server(s) and all files are to be saved at the local workstation or on floppy diskette, then it is vital that individual users be aware of their own responsibility to ake their own backups of any data files they create. Regardless of the ethod of data storage chosen, it is up to the user to periodically reove unwanted, old or outdated data files fro the syste to free up valuable disk space. The Network Adinistrator should regularly check available disk space to ensure sufficient capacity is available at all ties. Backup Strategies Regular backups of data on servers iniises the risk of data loss and daage caused by disk failures, virus infection or network probles. Backup procedures should be carefully planned and adhered to. Coercial backup progras such as Backup Exec are available to facilitate the procedures required for effectively anaging this aspect of data security. These are best used in conjunction with tape-drive hardware, which uses edia capable of storing high volues of data. Data drives and tapes are available in different capacities depending on requireents. Typically, a tape drive capable of backing up the contents of the server hard disk(s) to one tape is ideal. Inforation Technology Bureau MLANS304.doc 5 Educational Technologies Unit

6 Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent The basic types of backup procedures are: Full backup, in which all selected files are copied onto a tape. Increental, in which backup occurs only for files which have been changed or created since the last full or increental backup. In developing a backup plan, consider the following: Storage of data tapes should occur in a secure environent such as the school safe where fire, water and theft risks are iniised. Periodically verify data tape reliability in recovering files. A full backup should preferably fit on one data tape cartridge. Label tapes with date, tie and type of backup (Full or Increental) Rotate the backup edia. Conduct a full backup each week, an increental backup daily and archive full backup tapes on a onthly basis. Server access to the tape backup syste should be on an authorised, password protected basis only. Upgrading Existing Software and Installing New Software Installing software on file servers is very different to installing software on standalone coputers. For this reason it is iportant to obtain specialist advice if the school s Network Adinistrator is not failiar with the various odels of networked software installation. Because a server-based network is a centralised coputer syste, the entire concept of its use is to generate and follow standards and standardisation. It is recoended that decisions be ade on which specific products are to be chosen for each category of coputer use. For exaple, for the task of general word processing, the school could standardise on either Microsoft Word or Word Perfect but not both. Perhaps an integrated product such as Claris Works or Microsoft Works could cover several categories of coputer use. The reason for choosing one product in each category is to standardise file forats for ease of data transfer and to strealine staff training requireents. The selection of specific software for networked use across the school should always be ade by the school s technology coittee. Inforation Technology Bureau MLANS304.doc 6 Educational Technologies Unit

7 Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent The processes of upgrading to new versions of existing software and installation of new software involves not only how to ake the new software available to users, but how to ensure the new software will be used efficiently. This ay involve foral training, in-service training or peer support. Whichever ethod of staff training is chosen, the goal should be to ensure the continued use and acceptance of technology throughout the change. Coputer Viruses Coputer viruses are a separate concern for network adinistrators. As these can potentially be devastating to a coputer network, it is iperative that easures be taken to avoid infection. The best way to avoid infection is the education of users. Understanding what a virus is and how it spreads, and adopting work practices aong users to ensure infection cannot occur is the first step. Virus protection software is the safety net in case a virus anages to get through good work practices. What is a Coputer Virus? All viruses are coputer progras written by a person or persons - they are not biological. To be classed a virus, the progra ust have the ability to replicate and igrate fro coputer to coputer. This can be either via diskette or across a network. As well as propagating, viruses inherently cause daage. There are other rogue progras to be aware of such as Logic Bobs, Trojan Horses and Wors which are not viruses, but can be equally daaging. How Does a Virus Spread? All viruses hide soewhere on a floppy disk or a hard disk. Most viruses fall into the following categories: Boot Sector / Partition Table Viruses These live in the boot areas of disks and load into eory whenever the coputer is booted. They infect each diskette placed in the drive. Executable File Viruses These attach theselves to executable files (progras) and function whenever the infected progra is loaded. They infect other uninfected progras when they are loaded. Inforation Technology Bureau MLANS304.doc 7 Educational Technologies Unit

8 Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Multi-Partite Viruses These viruses are ade up of separate coponents and can be alost undetectable whilst at the sae tie infecting every file on your coputer. Macro Viruses These are ebedded in acros defined within certain word processing docuents or spreadsheet files. They are transferred by the sharing of the infected docuents. Soe Effects of Viruses The daage that a virus can cause is liited only by the iagination of its author. Soe of the typical effects include: degradation of processing speed; inappropriate screen essages; corruption of printouts; file deletion; corruption of files and File Allocation Tables (FAT); low-level foratting of disks. File allocation Tables: a record keeping structure DOS uses to keep track of the location of every file on the disk i.e. like an index. How to Avoid Viruses Viruses are getting sarter everyday, becoing harder to detect and there are thousands of different viruses in circulation. It is alost ipossible to totally avoid viruses however, these suggestions should help. 1 Ensure that coplete and regular backups are aintained for all coputer systes; 2 Use an up-to-date virus scanning progra on both file servers and workstations; 3 Be wary of all disks that have coe fro external sources (even fro hoe); 4 Do NOT participate in copyright infringeent; 5 Write-protect all original progra diskettes before using the; and 6 Install virus scanning software that autoatically scans for viruses. What if a Virus is Found? If the steps above were followed, this shouldn t happen, but if it does, follow the steps below: 1 Switch off the coputer and place a sign to let others know the coputer is infected; Inforation Technology Bureau MLANS304.doc 8 Educational Technologies Unit

9 Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent 2 Isolate all diskettes associated with that coputer. It is likely that soe or all are infected as well; 3 Attept to find the possible source of the virus; 4 Ask for help if unsure of how to reove the virus; and 5 Reinforce the steps listed above to avoid future viruses. Reoving a Virus The reoval of coputer viruses fro both standalone coputers and fro network file servers can be a coplex, tie-consuing procedure. Further inforation and evaluation copies of virus reoval progras is available fro the following Website: Inforation Technology Bureau MLANS304.doc 9 Educational Technologies Unit

Option B: Credit Card Processing

Option B: Credit Card Processing Attachent B Option B: Credit Card Processing Request for Proposal Nuber 4404 Z1 Bidders are required coplete all fors provided in this attachent if bidding on Option B: Credit Card Processing. Note: If

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure

Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure By Alan Radding and Nick Carr Abstract This paper discusses the issues related to storage design and anageent when an IT

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

PHYSICIAN OFFICE IT SECURITY GUIDE

PHYSICIAN OFFICE IT SECURITY GUIDE PHYSICIAN OFFICE IT SECURITY GUIDE 2015 The CMPA supports the advice and recoendations contained in this guide and encourages their consideration by BC s physicians. Disclaier: Best practices for IT security

More information

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE

More information

Presentation Safety Legislation and Standards

Presentation Safety Legislation and Standards levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

An Application Research on the Workflow-based Large-scale Hospital Information System Integration

An Application Research on the Workflow-based Large-scale Hospital Information System Integration 106 JOURNAL OF COMPUTERS, VOL. 6, NO. 1, JANUARY 2011 An Application Research on the Workflow-based Large-scale Hospital Inforation Syste Integration Yang Guojun School of Coputer, Neijiang Noral University,

More information

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST INFORMATION TECHNOLOGY & MANAGEMENT IT Checklist INTRODUCTION A small business is unlikely to have a dedicated IT Department or Help Desk. But all the tasks that a large organization requires of its IT

More information

Energy Proportionality for Disk Storage Using Replication

Energy Proportionality for Disk Storage Using Replication Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy

More information

EFFICIENCY BY DESIGN STORIES OF BEST PRACTICE IN PUBLIC BODIES

EFFICIENCY BY DESIGN STORIES OF BEST PRACTICE IN PUBLIC BODIES EFFICIENCY BY DESIGN STORIES OF BEST PRACTICE IN PUBLIC BODIES Acknowledgeents We would like to extend a special thank you to ebers of the Public Chairs Foru (PCF) and the Association of Chief Executives

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic [email protected] Jana Talašová Faculty of Science, Palacký Univerzity,

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

Identification and Analysis of hard disk drive in digital forensic

Identification and Analysis of hard disk drive in digital forensic Identification and Analysis of hard disk drive in digital forensic Kailash Kuar Dr. Sanjeev Sofat Dr. Naveen Aggarwal Phd(CSE) Student Prof. and Head CSE Deptt. Asst. Prof. CSE Deptt. PEC University of

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

New for 2016! Get Licensed

New for 2016! Get Licensed Financial Manageent 2016 HS There s only one place you need to go for all your professional developent needs. The Power to Know. NEW Experience a different school of learning! New for 2016! Online courses

More information

Investing in corporate bonds?

Investing in corporate bonds? Investing in corporate bonds? This independent guide fro the Australian Securities and Investents Coission (ASIC) can help you look past the return and assess the risks of corporate bonds. If you re thinking

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

(Self-Study) Identify How to Protect Your Network Against Viruses

(Self-Study) Identify How to Protect Your Network Against Viruses SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu [email protected] Departent of Coputer

More information

AutoHelp. An 'Intelligent' Case-Based Help Desk Providing. Web-Based Support for EOSDIS Customers. A Concept and Proof-of-Concept Implementation

AutoHelp. An 'Intelligent' Case-Based Help Desk Providing. Web-Based Support for EOSDIS Customers. A Concept and Proof-of-Concept Implementation //j yd xd/_ ' Year One Report ":,/_i',:?,2... i" _.,.j- _,._".;-/._. ","/ AutoHelp An 'Intelligent' Case-Based Help Desk Providing Web-Based Support for EOSDIS Custoers A Concept and Proof-of-Concept Ipleentation

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to [email protected] 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

High Performance Chinese/English Mixed OCR with Character Level Language Identification

High Performance Chinese/English Mixed OCR with Character Level Language Identification 2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Chapter 8: Security Measures Test your knowledge

Chapter 8: Security Measures Test your knowledge Security Equipment Chapter 8: Security Measures Test your knowledge 1. How does biometric security differ from using password security? Biometric security is the use of human physical characteristics (such

More information

Investing in corporate bonds?

Investing in corporate bonds? Investing in corporate bonds? This independent guide fro the Australian Securities and Investents Coission (ASIC) can help you look past the return and assess the risks of corporate bonds. If you re thinking

More information

Study on the development of statistical data on the European security technological and industrial base

Study on the development of statistical data on the European security technological and industrial base Study on the developent of statistical data on the European security technological and industrial base Security Sector Survey Analysis: France Client: European Coission DG Migration and Hoe Affairs Brussels,

More information

Optimizing and Protecting Hard Drives Chapter # 9

Optimizing and Protecting Hard Drives Chapter # 9 Optimizing and Protecting Hard Drives Chapter # 9 Amy Hissom Key Terms antivirus (AV) software Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates VirusScan

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

Insurance Spirals and the Lloyd s Market

Insurance Spirals and the Lloyd s Market Insurance Spirals and the Lloyd s Market Andrew Bain University of Glasgow Abstract This paper presents a odel of reinsurance arket spirals, and applies it to the situation that existed in the Lloyd s

More information

Introduction to the Microsoft Sync Framework. Michael Clark Development Manager Microsoft

Introduction to the Microsoft Sync Framework. Michael Clark Development Manager Microsoft Introduction to the Michael Clark Developent Manager Microsoft Agenda Why Is Sync both Interesting and Hard Sync Fraework Overview Using the Sync Fraework Future Directions Suary Why Is Sync Iportant Coputing

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

An online sulfur monitoring system can improve process balance sheets

An online sulfur monitoring system can improve process balance sheets Originally appeared in: February 2007, pgs 109-116. Used with perission. An online sulfur onitoring syste can iprove process balance sheets A Canadian gas processor used this technology to eet environental

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC [email protected] Abstract Custoer relationship

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM Eercise 4 IVESTIGATIO OF THE OE-DEGREE-OF-FREEDOM SYSTEM 1. Ai of the eercise Identification of paraeters of the euation describing a one-degree-of- freedo (1 DOF) atheatical odel of the real vibrating

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

Modeling Nurse Scheduling Problem Using 0-1 Goal Programming: A Case Study Of Tafo Government Hospital, Kumasi-Ghana

Modeling Nurse Scheduling Problem Using 0-1 Goal Programming: A Case Study Of Tafo Government Hospital, Kumasi-Ghana Modeling Nurse Scheduling Proble Using 0-1 Goal Prograing: A Case Study Of Tafo Governent Hospital, Kuasi-Ghana Wallace Agyei, Willia Obeng-Denteh, Eanuel A. Andaa Abstract: The proble of scheduling nurses

More information

Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued)

Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued) Chapter 1: Networking with Microsoft Learning Objectives Plan what network model to apply to your network Compare the differences between Windows 2000 Professional, Server, Advanced Server, and Datacenter

More information

Introduction to Unit Conversion: the SI

Introduction to Unit Conversion: the SI The Matheatics 11 Copetency Test Introduction to Unit Conversion: the SI In this the next docuent in this series is presented illustrated an effective reliable approach to carryin out unit conversions

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong [email protected]

More information

Markovian inventory policy with application to the paper industry

Markovian inventory policy with application to the paper industry Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA [email protected], [email protected]

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

Unit 11: Installing, Configuring and Administering Microsoft Windows Professional

Unit 11: Installing, Configuring and Administering Microsoft Windows Professional Unit 11: Installing, Configuring and Administering Microsoft Windows Professional Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Log on, access and

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Birkenhead Sixth Form College IT Disaster Recovery Plan

Birkenhead Sixth Form College IT Disaster Recovery Plan Author: Role: Mal Blackburne College Learning Manager Page 1 of 14 Introduction...3 Objectives/Constraints...3 Assumptions...4 Incidents Requiring Action...4 Physical Safeguards...5 Types of Computer Service

More information

STELLAR PHOENIX for Novell NetWare Data Recovery Software User Manual

STELLAR PHOENIX for Novell NetWare Data Recovery Software User Manual STELLAR PHOENIX for Novell NetWare Data Recovery Software User Manual Copyright 2001 by Stellar Information Systems Ltd. All Rights Reserved The information contained in this documentation is subject to

More information

4 Backing Up and Restoring System Software

4 Backing Up and Restoring System Software 4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring

More information

Symantec Backup Exec 2014 Icon List

Symantec Backup Exec 2014 Icon List Symantec Backup Exec 2014 Icon List Alerts Image Description Alert needs attention Alerts Alert needs attention Alert needs attention Alert needs attention Error Error Error Error Informational alert Informational

More information

Don t Run With Your Retirement Money

Don t Run With Your Retirement Money Don t Run With Your Retireent Money Understanding Your Resources and How Best to Use The A joint project of The Actuarial Foundation and WISER, the Woen s Institute for a Secure Retireent WISER THE WOMEN

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

US 20100077068A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2010/0077068 A1 Saha et al. (43) Pub. Date: Mar.

US 20100077068A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2010/0077068 A1 Saha et al. (43) Pub. Date: Mar. US 20100077068A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2010/0077068 A1 Saha et al. (43) Pub. Date: Mar. 25, 2010 (54) PROCESSING OF SERVICE-ORIENTED Publication Classi?cation

More information

Driving Behavior Analysis Based on Vehicle OBD Information and AdaBoost Algorithms

Driving Behavior Analysis Based on Vehicle OBD Information and AdaBoost Algorithms , March 18-20, 2015, Hong Kong Driving Behavior Analysis Based on Vehicle OBD Inforation and AdaBoost Algoriths Shi-Huang Chen, Jeng-Shyang Pan, and Kaixuan Lu Abstract This paper proposes a novel driving

More information

Financial Aid Workshop Promotional Kit

Financial Aid Workshop Promotional Kit Financial Aid Workshop Prootional Kit CFWV.COM West Virginia s Free College-Planning Resource The College Foundation of West Virginia, online at www.cfwv.co, provides FREE resources to help students and

More information

A Fast Algorithm for Online Placement and Reorganization of Replicated Data

A Fast Algorithm for Online Placement and Reorganization of Replicated Data A Fast Algorith for Online Placeent and Reorganization of Replicated Data R. J. Honicky Storage Systes Research Center University of California, Santa Cruz Ethan L. Miller Storage Systes Research Center

More information

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food

More information

1 File Management, Virus Protection, and Backup 2 File Basics Every file has a name, and might also have a filename extension You must provide a valid filename that adheres to rules or file-naming conventions

More information

Best Practices for DanPac Express Cyber Security

Best Practices for DanPac Express Cyber Security March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction

More information

THINKSERVER OS AND VIRTUALIZATION OPTIONS

THINKSERVER OS AND VIRTUALIZATION OPTIONS THINKSERVER OS AND VIRTUALIZATION OPTIONS MICROSOFT WINDOWS SERVER 2012: THE NEW ENTERPRISE STANDARD You rely on ThinkServer racks and servers to power your business-critical deployents because you trust

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

OpenGamma Documentation Bond Pricing

OpenGamma Documentation Bond Pricing OpenGaa Docuentation Bond Pricing Marc Henrard [email protected] OpenGaa Docuentation n. 5 Version 2.0 - May 2013 Abstract The details of the ipleentation of pricing for fixed coupon bonds and floating rate

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

Study on the development of statistical data on the European security technological and industrial base

Study on the development of statistical data on the European security technological and industrial base Study on the developent of statistical data on the European security technological and industrial base Security Sector Survey Analysis: Poland Client: European Coission DG Migration and Hoe Affairs Brussels,

More information

Network Documentation Checklist

Network Documentation Checklist Network Documentation Checklist Don Krause, Creator of NetworkDNA This list has been created to provide the most elaborate overview of elements in a network that should be documented. Network Documentation

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

Data Backup Options for SME s

Data Backup Options for SME s Data Backup Options for SME s As an IT Solutions company, Alchemy are often asked what is the best backup solution? The answer has changed over the years and depends a lot on your situation. We recognize

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information